Lucene search

K
redhatcveRedhat.comRH:CVE-2022-40133
HistoryOct 13, 2022 - 2:30 p.m.

CVE-2022-40133

2022-10-1314:30:37
redhat.com
access.redhat.com
14
cve-2022-40133
denial of service
ioctl()
/dev/dri/card0
/dev/dri/rendererd128
vmwgfx kernel module

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free vulnerability was found in the Linux kernel’s vmwgfx driver in vmw_execbuf_tie_context. This flaw allows a local, unprivileged attacker with access to either /dev/dri/card0 or /dev/dri/rendererD128, who can issue an ioctl() on the resulting file descriptor, to crash the system, causing a denial of service.

Mitigation

To mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the vmwgfx kernel module. For instructions relating to blacklisting a kernel module, please see <https://access.redhat.com/solutions/41278&gt;.

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H

0.0004 Low

EPSS

Percentile

5.1%